Small Wars Journal

Journal

Journal Articles are typically longer works with more more analysis than the news and short commentary in the SWJ Blog.

We accept contributed content from serious voices across the small wars community, then publish it here as quickly as we can, per our Editorial Policy, to help fuel timely, thoughtful, and unvarnished discussion of the diverse and complex issues inherent in small wars.

by Matthew Cancian | Thu, 10/20/2016 - 8:09am | 0 comments

In the short term, issues of humanitarian relief are critical, but in the long term the deals that are made between local actors and the two larger players.

by Michael Klipstein, by Michael Senft | Wed, 10/19/2016 - 9:09am | 0 comments

The unrelenting tempo of combat operations at the Corps and below level in the Army creates unique challenges for the execution of Offensive Cyber Operations.

by T.C. Moe | Tue, 10/18/2016 - 10:05am | 1 comment

For naval intelligence to effectively support the Chief of Naval Operation’s new strategy, it must first adapt to the realities of the digital information age.

by Jeff Jager | Mon, 10/17/2016 - 8:11am | 1 comment

Named Operation Euphrates Shield, this ongoing Turkish military operation demonstrates the continued relevance of land power for achieving strategic objectives.

by Ian Kippen | Wed, 10/12/2016 - 8:46pm | 0 comments

Love or hate the Centre of Gravity concept, it is here to stay.

by Atlantic-Community.org | Tue, 10/11/2016 - 4:53am | 0 comments

A diverse set of policies is needed to unify a diverse set of peoples against a diverse set of threats - NATO should reorganize itself.

by Daniel Fisher, by Christopher Mercado | Mon, 10/10/2016 - 7:07am | 0 comments

Both of us served in Kunduz from 2011-12, at a time when it seemed as though the province would continue on a trajectory of increasing stability.

by Atlantic-Community.org | Sun, 10/09/2016 - 8:21am | 2 comments

Like any other organization, NATO has made mistakes. What is crucial is that the Alliance recognizes what went wrong and why, thus preventing these same mistakes in the future.

by Atlantic-Community.org | Sat, 10/08/2016 - 8:11am | 1 comment

NATO must adopt hybrid models of national defense, coordinate efforts on economic and electronic warfare, and secure its space-based infrastructure.

by Douglas Farah | Fri, 10/07/2016 - 4:10pm | 0 comments

There are multiple reasons for the surprise outcome, but largely missing from the discussion is the fact that the FARC is perhaps the most reviled insurgency that ever arose in Latin America.

by Albert Palazzo | Fri, 10/07/2016 - 6:36am | 1 comment

Despite its centrality to the contemporary way of war, the days of joint operations are numbered.

by Robert Murphy | Thu, 10/06/2016 - 12:09pm | 0 comments

European Union ambitions for a military force distinct from NATO are absurd. The list of challenges to forming such a force are legion.

by James Howcroft | Thu, 10/06/2016 - 6:23am | 0 comments

Capturing the buildings of Mosul are secondary to conducting the battle in a way that secures the greater key to stability - the loyalty and support of the population of Mosul.

by Taylor R. Applegate | Sat, 10/01/2016 - 9:55am | 5 comments

The five cases examined in this study show that a long-term solution must be aimed at preventing self-radicalization in the first place.

by Daniel Tyler Brooks | Fri, 09/30/2016 - 11:54am | 1 comment

Transitions to democracy following forced regime change via military intervention require a last military dictator.

by Brenda Fiegel | Fri, 09/30/2016 - 9:20am | 0 comments

This paper discusses how Mexican cartel tunnels have evolved during the last five years while addressing specific uses.

by Michael P. Ferguson | Thu, 09/29/2016 - 12:50pm | 0 comments

This monograph uses the backdrop of Fehrenbach’s classic to investigate how militaries build preparedness, primarily among their infantry ranks.

by Dante Paradiso | Wed, 09/28/2016 - 11:15am | 0 comments

Excerpted from "The Embassy: A Story of War and Diplomacy" © 2016 by Dante Paradiso, to be published by Beaufort Books (New York).

by Frank N. Sanders, by Jennifer A. Obernier | Wed, 09/28/2016 - 1:14am | 3 comments

This paper explores how the similarities between covert action and UW activities have led to a negative perception of UW and lengthy delays in its use.

by Shawn Woodford | Tue, 09/27/2016 - 10:09am | 2 comments

How many troops are needed to defeat an insurgency? This deceptively innocuous question is laden with political and military peril. The answer is, of course, that it depends.

by Frank Kisner | Sun, 09/25/2016 - 8:02am | 1 comment

Iran is destined to remain a “victim” because its leaders have determined it is in their best interest to do so. 

by Stephen Goto | Thu, 09/22/2016 - 10:11am | 0 comments

One must ask why Civil Affairs specialists, the purported experts of the civilian domain are so ill-trained and equipped to reconnoiter the civil space?

by SWJ Editors | Wed, 09/21/2016 - 11:34am | 2 comments

Continue on for all the details.

by Zdravko Matic, by Frano Stojic | Tue, 09/20/2016 - 10:30am | 0 comments

Many political analysts and historians referred to the war as one for independence or as a civil war. This characterization is incomplete and contributes to numerous misconceptions about the conflict.

by Steve Blank | Mon, 09/19/2016 - 12:16pm | 0 comments

Hacking for Defense is a battle-tested problem-solving methodology that runs at Silicon Valley speed. We just held our first Hacking for Defense Educators Class with 75 attendees.

by William M. Darley | Mon, 09/19/2016 - 11:05am | 0 comments

The best way to defeat terrorism motivation rooted in religious convictions is not through a continuation of government-sponsored, Madison-Avenue-style advertising and PSYOP.

by Driss Ghali | Sun, 09/18/2016 - 5:13pm | 0 comments

Galula was a self-made man in various aspects; born into a relatively modest environment, he rose to positions where no one expected him to.

by Kyle Borne | Sat, 09/17/2016 - 6:31am | 3 comments

This paper explores current recruiting practices, its shortfalls, and offers solutions tied to a thorough job analysis and restructured recruiting strategy.

by Thomas Doherty | Fri, 09/16/2016 - 1:35am | 11 comments

Islamic extremist ideology has become a pandemic super-infection resistant to current counter-ideological methodologies.

by Vince Tumminello | Thu, 09/15/2016 - 11:03am | 0 comments

A red team assessment of Syrian prospects for counterinsurgency written in December of 2015. It is a blueprint for Syrian military, economic, and political success in the coming years.

by Jason M. Bender | Wed, 09/14/2016 - 12:02pm | 0 comments

This monograph is a revision of a paper submitted for consideration during the 2008 U.S. Army Command and General Staff College historical writing competition for CGSC Course 08-01.

by George M. Schwartz | Tue, 09/13/2016 - 12:37pm | 1 comment

Mad Scientist # 20: The demand for cybersecurity professionals is exceeding the number available, and some estimate that more than 200,000 positions are currently unfilled.

by Robert Zager, by John Zager | Tue, 09/13/2016 - 2:34am | 2 comments

Mad Scientist # 19: We are losing the cyberwar because cyber defenses apply the wrong philosophy to the wrong operating environment.

by Blake Rhoades, by Brian Schultz | Tue, 09/13/2016 - 1:25am | 0 comments

Mad Scientist # 18: The purpose of this paper is to highlight the need for strategic broadening and policy education for mid-career Cyberspace leaders.

by Drew Calcagno | Mon, 09/12/2016 - 3:39pm | 0 comments

An Empirical look at drivers of terrorism, ventures to determine whether Abadie’s findings in “Poverty, Political Freedom, and the Roots of Terrorism” remain true after ten years.

by Thammy Evans | Mon, 09/12/2016 - 9:34am | 0 comments

This essay explores one of the key and most underemphasized components of building successful fighting power, namely the moral component.

by Gordon Richmond | Sun, 09/11/2016 - 7:08am | 4 comments

Though the training scenario was an imperfect reflection of a real-world UW mission, our success could be replicated in other environments by any ODA.

by John P. Sullivan, by Robert Bunker | Sat, 09/10/2016 - 10:37am | 0 comments

Continue on for a Small Wars Journal-El Centro update and call for papers.

by Robert Bunker, by John P. Sullivan | Sat, 09/10/2016 - 8:18am | 0 comments

El Salvador’s Attorney General is concerned that the maras, Mara Salvatrucha (MS-13) in particular, are developing armed commando battalions that are designed to confront the state.

by Kurtis M. Hout Jr. | Sat, 09/10/2016 - 7:07am | 0 comments

Mad Scientist # 17: The Army is allocating proportional resources to the cyber domain as it is to the success or failure of key weapon systems.

by Andrew Schoka | Sat, 09/10/2016 - 6:52am | 0 comments

Mad Scientist # 16: The US Army is moving to field the next generation of cyber warfighters, and the need to identify, train, and develop these cyber professionals is becoming increasingly critical.

by Chris Telley | Sun, 09/04/2016 - 4:55pm | 1 comment

The US can enable novel gains in the information environment by collecting on, operating in, and collaborating through indigenously produced economic media.

by Mathew Fukuzawa | Sat, 09/03/2016 - 9:44am | 0 comments

While many of the Army’s great leaders have blossomed on the battlefield without systematic development, there are doctrinal references that define leader development processes.

by Malcolm Beith | Fri, 09/02/2016 - 12:56pm | 1 comment

A UN departure could cause more than just trouble in terms of quelling rebels. The 20,000 peacekeepers are now a backbone of the nation’s struggling economy.

by Octavian Manea | Fri, 09/02/2016 - 4:10am | 1 comment

Small Wars Journal interview with Karsten Friis, Senior Adviser and Head of the Norwegian Institute of International Affairs’ Research Group on Security and Defense.

by Ryan Harmon, by Mark Holden, by Brandon Sasnett | Thu, 09/01/2016 - 4:59pm | 0 comments

This article uses the C-UAS problem set as a case study to highlight some of the challenges the Army faces responding to the increased use of innovative technologies by our adversaries.

by Rick Chersicla | Thu, 09/01/2016 - 10:37am | 1 comment

An often-overlooked part of the conflict in Southeast Asia, the formation of and lessons learned by the MRF can serve as the groundwork of a future joint riverine force.

by Gary E. Phillips | Wed, 08/31/2016 - 8:12pm | 0 comments

As weapons platforms become increasingly digital, the risk from electronic interference becomes increasingly troublesome—including hacking, jamming, and even hijacking of remote platforms.

by Jack McCain | Wed, 08/31/2016 - 7:28am | 0 comments

The war saw the engagement of South African, Namibian, Angolan, Cuban, Soviet, Chinese and even American forces in an array of operations and offensives.

by Whitney O’Connell, by Ashley Holzmann | Tue, 08/30/2016 - 12:57pm | 1 comment

This article addresses Psychological Operations Measures of Effectiveness pitfalls and fixing the measurement and reporting problems.